Saturday, March 03, 2012

Twombly Pleading Standard in Colorado State Court (Updated)

Does the revised pleading standard set forth by the U.S. Supreme Court in Bell Atlantic Corp. v. Twombly, 550 U.S. 544 (2007), apply to pleadings in Colorado state courts?  This is a particularly important question as adoption of the Twombly standard could substantially alter the terrain for motions to dismiss in Colorado.

The short answer is that Twombly has not been adopted by Colorado state courts--at least not at the appellate level, yet.  (Of note, a former member of the Colorado Supreme Court was named Twombly, so the name does pop up frequently in Colorado cases in an entirely unrelated context.)  


As of March 2012, only one Colorado state appellate court opinion has cited the recent US Supreme Court opinion in Bell Atlantic Corp. v. Twombly, and that case is Western Innovations, Inc. v. Sonitrol Corp., 187 P.3d 1155, 1158 (Colo. App. 2008) (a case on which I was peripherally involved).  Sonitrol is anything but an endorsement of Twombly--it is a “but see” cite included as contrast to the quotation of the Colorado pleading standard of complaint should not be dismissed for failure to state a claim unless it appears beyond doubt that the plaintiff cannot prove facts in support of a claim that would entitle it to relief. Coors Brewing Co. v. Floyd, 978 P.2d 663, 665 (Colo. 1999).  (Note that Sonitrol was decided before Iqbal, in which the Supreme Court expressly extended the Twombly standard to all federal complaints, not just antitrust matters).

Ultimately, Sonitrol neither adopted nor rejected Twombly.  Accordingly, it is uncertain whether Colorado will eventually adopt Twombly.  In my opinion, however, it is likely that Colorado will eventually expressly adopt Twombly (or some similar standard).  A growing body of case law is developing at the federal level applying Twombly, and the kinks are being gradually worked out.  Colorado tends to look on case law interpreting the Federal Rules of Civil Procedure as persuasive precedent in interpreting a similar Colorado Rule.  See Benton v. Adams, 56 P.3d 81, 86 (Colo. 2002) ("When a Colorado rule is similar to a Federal Rule," Colorado courts "may look to federal authority for guidance in construing the Colorado rule.").  Most importantly, there are several persuasive arguments in favor of the Twombly standard, especially in light of the courts' backlog and the Court's general desire to reduce frivolous litigation.

Already, at the trial court level, Twombly is being used with some success--I have personally referred to Twombly as persuasive authority to support a motion to dismiss, and the motion was granted.  While it is certainly not binding precedent at this point, I think courts are both persuaded by the reasoning behind Twombly and its progeny and think it's likely that Colorado appellate courts could adopt some version of Twombly at any time.  Accordingly, where possible, I think that courts will look to build a "double hull" into their rulings on motions to dismiss to ensure that they are appropriate under either standard.  For the careful practitioner--on both Defense and Plaintiff side--it is important to understand and apply this tension when briefing a motion to dismiss.

Finally, when drafting a complaint in Colorado state court, it is certainly wise to consider Twombly if there is any possibility that the case will be removed to federal court.
-
Jeff Vail is a Colorado business litigation attorney at The Law Office of Jeff Vail LLC.

Thursday, February 23, 2012

Determining the Scope of Preservation of Evidence

The duty to preserve evidence requires the producing party to make a good faith effort to identify and manage relevant discoverable information.   Once the party recognizes when the duty to preserve attaches, the next step is to determine what potentially discoverable information must be preserved.  SeeMosaid Techs. Inc. v. Samsung Elecs. Co., 348 F. Supp. 2d 332, 336 (D.N.J. 2004) (“…while a litigant is under no duty to keep or retain every document in its possession, even in advance of litigation, it is under a duty to preserve what it knows, or reasonably should know, will likely be requested in reasonably foreseeable litigation.”).  And because the vast majority of business information is now generated electronically without ever being printed to paper, the scope of preservation naturally includes electronically stored information (ESI).   Determining the scope of preservation of ESI presents a great challenge and must be balanced with a party’s right to continue to manage its electronic information and operate its business in a relatively normal fashion.

Preservation issues should be addressed at the outset of litigation, and both sides should be prepared to discuss the matter at the initial meet and confer sessions.  All parties are responsible for taking steps to preserve relevant evidence, and pursuant to Fed. R. Civ. P. 26(b)(2)(C) need to consider the cost, burden and necessity of preserving the information.  In Colorado state court, there is substantially less case law related to preservation, especially of ESI, but a good rule of thumb would be to ensure that one conforms to the requirements under the Federal Rules as well as any unique Colorado requirements.

Following are some suggestions to assist you in determining the scope of preservation:
  • Consider the complexity of the case and seek cooperation, common ground, and fiscal reasonableness.
  • What is the cost of production compared to the amount in controversy?
  • What are the resources of each party?  What is the ability of each party to control costs, and what is its incentive to do so?
  • What is the relevance of the evidence relative to the claims and defenses in the case?
  • Consider the need to protect privileged, proprietary, or confidential information (including trade secrets).
  • Know where a party’s electronic information may be found.
  • Avoid unreasonable, overly broad, burdensome, or unnecessarily costly requests to produce ESI.  Consider collecting data from repositories used by key individuals rather than searching through an organization’s entire electronic storage systems.
  • Apply reasonable selection criteria (search terms, date restrictions, folder designations, etc.).
  • Determine the need for preservation and production of ESI that may not be apparent to ordinary employees or a party’s records custodians.
  • What is the ease of accessing the information, and is it available from other sources?
  • Is the ESI stored in such a way that it is unreasonably more costly or burdensome to access?  See, Zubulake v. UBS Warburg LLC, 217 F.R.D. 309, 324 (S.D.N.Y. 2003) ("...plaintiff entitled to all emails and electronic documents relevant to employment discrimination claim, including those only preserved on backup tapes; however, given burden and expense of restoring inaccessible backup tapes, a cost-shifting analysis is appropriate.”)
  • Could a subset or representative sample of the requested ESI be provided to determine whether production of additional information is warranted?
  • Identify potentially relevant materials that are most critical or most difficult to preserve/collect.
  • Know document retention and destruction policies and practices--as soon as the duty to preserve has attached, immediately suspend any document destruction or data deletion policies until they can be reviewed to ensure compliance with preservation duties.
  • Has a party deleted, discarded or erased any ESI after litigation was commenced, or after the party was aware that litigation was reasonably foreseeable? (Spoliation is defined as the destruction or failure to preserve resulting in the loss of evidence in pending or reasonably foreseeable litigation. Silvestri v. General Motors, 271 F.3d 583, 589 (4th Cir. 2001)).
It may be possible to reach a stipulation as to the extent of preservation required in a given case.  Where a stipulation is not reached, it is wise to advise the opposing party in writing as to the scope of preservation duties you believe they have.  See, e.g., Optowave Co. Ltd. v. Nitikin, 2006 U.S. Dist. LEXIS 81345 at *30 (M.D. Fla. Nov. 7, 2006) (finding that notice from opposing counsel about relevant categories of information put party on notice about scope of preservation duty).  Likewise, it is wise to err on the side of over-preservation of evidence of one's own data, especially where the potential damages or sanctions for failure to preserve are significant.



This post provides general legal information.  It is not legal advice tailored to your specific factual situation.

Tuesday, February 14, 2012

When Does The Duty To Preserve Evidence Arise?


When does the duty to preserve relevant material arise?  Generally, it arises when litigation or an
investigation is “reasonably anticipated.”  Without question, the duty to preserve begins when a
Summons and Complaint is received.  However, there may be times when a pre-litigation dispute
is reasonably anticipated to lead to litigation, in which case a litigation hold notice should be
issued.   In Asher Assocs., LLC v. Baker Hughes Oilfield Operations, Inc., 2009 U.S. Dist.
LEXIS 40136 at *23 (D. Colo. May 12, 2009) the court found that the obligation to preserve
evidence may arise even earlier than the actual filing of a lawsuit if a party has notice that future
litigation is likely.  Of course, for the plaintiff, the duty to preserve evidence normally arises well
before the filing of the lawsuit.  While there is no bright line regarding how early a plaintiff’s
duty to preserve arises in the process of contemplating and preparing to bring a lawsuit,
plaintiffs’ counsel should err on the side of caution and advise a client that there is a duty to
preserve as soon as the engagement begins to evaluate potential claims.

Consider the following questions to determine if the duty to preserve has been triggered.

Do the known facts suggest that litigation is likely?  Answering this question can be tricky, and requires a thorough examination of all known facts.
Has a consumer or customer complaint been received that clearly and credibly threatens suit?  A letter from a customer requesting a refund or suggesting that they will sue without describing the alleged wrongdoing, injury, or damages, probably does not warrant a hold.  If the letter is from the customer’s attorney, making a credible demand and threatening suit, then the duty to preserve is triggered.  In Asher,  plaintiff’s counsel sent two separate letters to defendant. The first letter expressed plaintiff’s desire to settle a warranty claim and did not threaten litigation.  The subsequent letter sent by plaintiff’s counsel made a claim for damages and set a 5-day deadline for payment.  The court found that the duty to preserve was triggered upon receipt of the second letter.
Have there been repeated, specific complaints about a particular issue? In Computer Assoc. Int’l v. American Fundware, Inc., 133 F.R.D. 166, 168-69 (D. Colo. 1990), the court found that during pre-litigation meetings, one software company was explicit in its communication to the other software company that it believed the other company was copying its source code, thereby triggering the duty to preserve evidence related to the source code.
Does legal counsel anticipate a lawsuit or investigation? There are times when counsel becomes aware, either through the media, employees, or other sources, that litigation or an investigation is possible.
Do company representatives know of the possibility of a lawsuit?
Has Plaintiff decided to file suit?
Has a Summons and Complaint been received?  This is one of the few bright line points where a duty to preserve always exists no later than the receipt of a Summons and Complaint.

All of these factors should be considered when evaluating when the duty to preserve arises.  Once it has been established that preservation of relevant evidence is required, the next step in the process is to determine the scope of preservation. This topic is a hot potato, and one that directly impacts the cost of litigation and the risk of future discovery sanctions for failure to preserve. I’ll address this issue in future posts, focusing on electronically stored information, as well as discovery of social media.

This post provides general legal information.  It is not legal advice tailored to your specific factual situation.

Tuesday, February 07, 2012

Rule 26(f) Conference Checklist


             F.R.C.P. 26(f) requires that all parties confer “as soon as practicable—and in any event at least 21 days before a scheduling conference is set” to discuss “the nature and basis of their claims and defenses,” “the possibilities for promptly settling or resolving the case,” “arrange for the disclosures required by Rule 26(a)(1),” “discuss any issues about preserving discoverable information,” and “develop a proposed discovery plan.”  The discovery plan prepared by the parties should address “changes . . . in the timing, form, or requirements for disclosures under Rule 26(a),” “the subjects on which discovery may be needed, when discovery should be completed, and whether discovery should be conducted in phases or be limited to or focused on particular issues,” “any issues about disclosure or discovery of electronically stored information, including the form or forms in which it should be produced,” “any issues about claims of privilege or of protection [of] trial-preparation materials,” and “what changes should be made in the limitations on discovery imposed under these rules . . . .”

            C.R.C.P. 16(b)(3) provides a similar requirement under Colorado law, requiring the parties to “no later than 15 days after the case is at issue . . . confer with each other about the nature and basis of the claims and defenses; the matters to be disclosed pursuant to C.R.C.P. 26(a)(1); and whether a Modified Case Management Order is necessary.”  While the specific requirements of C.R.C.P. 16(b)(3) are less detailed than F.R.C.P. 26(f), it is a best practice to follow the federal guidelines in state court conferences.

            This initial conference is also an excellent opportunity to outline additional time and cost-saving measures.

            One best practice is to provide to opposing counsel via letter a proposal for the following items.  This serves both to streamline and guide the 26(f) conference and to create a record of the proposals and good faith efforts made to streamline discovery.

            Consider discussing some or all of the following at a Rule 26(f) conference:

Nature and Basis of Claims and Defenses:
- Plaintiff should inquire into anticipated defenses if Answer not yet filed, or for explanation of affirmative defenses where presented
- Defendant should inquire into factual basis for claims where not specifically articulated in Complaint

Settlement:
- Make initial/follow-on settlement offers if appropriate
- Discuss timing of future settlement efforts and mediation in light of discovery schedule

Initial Disclosures, ESI, Preservation of Information, Production Format:
- Discuss scope of appropriate initial disclosures where appropriate
Discuss types of ESI that may be relevant, including local storage, networked storage, individual employee computers, smart phones (repositories of text messages and photos), corporate blogs and wikis, individual and corporate social media information on Facebook, blogs, Twitter, corporate voicemail, personal and corporate instant messaging, calendaring systems
- Where Electronically Stored Information exists (nearly every case), discuss the extent and structure of each parties ESI and consider agreeing that the parties will produce an outline of their ESI storage and structure to streamline requests and production.  Overview of ESI systems should include discussion of:
                        - Date ranges for review
                        - Name and role of ESI custodians
                        - ESI system types and structure (including individual workstations, shared drives, etc.
                        - File types that will be searched
                        - Search terms that will be used
- Counsel should familiarize themselves with their own client’s ESI structure and information before the Rule 26(f) conference
- Consider agreeing that, following receipt of outline of ESI custodians and structure, each party may nominate 5 ESI custodians in opposing party for preservation and review
- Discuss format for production of documents (e.g. PDF files with OCR layer provided by email to opposing counsel where size permits, otherwise by US Mail or courier)
- Discuss importance that documents be produced in the order in which they are kept in the ordinary course of business
- Discuss necessity and form of protective order for confidential documents
- Agree that, where native format of ESI differs from production format, parties will additionally produce document in native-format where specifically requested (i.e. Excel spreadsheets (.xls), QuickBooks files (.qbb), etc.)
- Address scope of potentially relevant information including ESI, and appropriate preservation measures
- Discuss rolling production time-frames in light of discovery schedule

Privilege Issues:
- Address any case-specific privilege issues
- Agree on timing of disclosure of privilege log and format for log
Agree that documents created after a certain date (often case filing date) need not be included on privilege log
- Agree to claw-back provision that inadvertent production will not waive privilege
- Consider agreeing that each side may designate up to 20 documents from privilege log for in-camera inspection

Proposed Discovery Plan (for inclusion in proposed scheduling order):
- Discuss potential for informal discovery
- Number and names of deponents and time limitations, location
- Number of written discovery requests
- Discuss number and deadline for disclosure of expert witness reports
- Discuss whether limitation/elimination of expert depositions is appropriate

Additional Cost/Time-Saving Measures
- Agree that all discovery disputes will be discussed by phone call between counsel, not via letter
- Agree that all depositions will be scheduled by agreement (no unilateral notices)
- Agree that all deposition exhibits will be numbered sequentially
- Agree that, if FRCP don’t apply, neither side will be entitled to communications with experts not discoverable under FRCP 26(a)(2)

            The agreements reached during the Rule 26(f) conference, as well as the competing views of the parties where no agreement was reached, should be documented in a joint report to the Court that must be filed within 14 days after the conference.



This post provides general legal information.  It is not legal advice tailored to your specific factual situation.

Tuesday, January 31, 2012

Discovery of Social Media Information: Privacy, Authentication, and Practice Tips



Last week’s blog post briefly discussed the evolution of FRCP 34 as it relates to the admissibility of electronic compilations of data for discovery purposes, and how social media, with its cache of potentially discoverable electronic information, has impacted the e-discovery process.  Generally speaking, the courts treat social media information the same as other electronic data obtained for discovery purposes.  However, social networking sites represent a new frontier for electronic discovery and bring with them a novel set of issues to be explored. 

Not only is the admissibility of ESI from social networking sites subject to application of the Federal Rules of Civil Procedure, evidentiary criteria for electronic data are further defined by the Federal Rules of Evidence (addressing such matters as relevance, authenticity, prohibition on hearsay, reliability, probative value, etc.). Case law provides a significant repository of information related to the discoverability of social media, including decisions related to privacy; First Amendment issues; Fourth Amendment issues; application of the Federal Rules of Civil Procedure and Federal Rules of Evidence; duty to preserve/spoliation of evidence; and authentication.  Two of these issues are frequently litigated: user privacy rights and authentication of data.

Privacy issues are complex, and discovery of social media raises not only First and Fourth Amendment issues, but may also involve the Electronic Communications Privacy Act (“ECPA”), 18 U.S.C. § 2701 (1986) (also referred to as the “Stored Communications Act” (“SCA”)). Courts are grappling with the role of traditional privacy rights as they relate to discovery of social media and have found that individuals generally do not have a reasonable expectation of privacy with regard to information they provide on social networking sites.

In Ledbetter v. Wal-Mart Stores Inc., 2009 U.S. Dist. LEXIS 126859, No. 06-1958 (D. Colo. Apr. 21, 2009), plaintiffs filed a personal injury action against defendant Wal-Mart, alleging physical injury, mental trauma, and loss of consortium.  Defendant subpoenaed Facebook, MySpace, and Meetup.com to obtain Plaintiff’s personal information, and plaintiff filed a motion for protective order claiming physician-patient and spousal privilege. Magistrate  Judge Watanabe denied plaintiff’s order, finding that the information requested in the subpoena was relevant and reasonably calculated to lead to the discovery of admissible evidence.

With regard to authentication of ESI from social networking sites, some courts have suggested that the ease with which social media data can be manipulated creates the need for a higher standard of authentication.  So, while ESI from social networking sites can be discoverable, it is not considered to be self-authenticating. In Griffin v. Maryland, No. 74, 2011 WL 1586683, at *1-10, *4 (Md. Apr. 28, 2011), the Maryland Supreme Court found that the State failed to provide extrinsic evidence to properly attribute a MySpace profile and postings to the purported author, and remanded the case for a new trial.  The court stated that "anyone can create a fictitious account and masquerade under another person's name or can gain access to another's account by obtaining the user's username and password."

E-discovery cases continue to grow in number and complexity, and federal e-discovery decisions are sometimes inconsistent. Internet usage should be given a high priority when advising clients as the potential for a client to damage their own case is very real. Alternately, social media provides fertile ground for the discovery of useful information about adverse parties.

Some practice tips to consider:

1.         Before issuing a subpoena to a social networking site, seek discovery of social networking information from the opposing party first.

2.         Public searches yield a surprising amount of information about which social networking sites a user participates in, what their user profile includes, and what type of information they are posting.

3.         Be cautious of hiring a private investigator to “friend” the opposing party on any social media sites.  And certainly don’t attempt to contact the opposing party yourself via any SNS.  Such approaches are likely to backfire, may constitute impermissible communication with a represented party, and are likely unethical if they involve deceit.

4.         Take care to avoid spoliation of evidence—as soon as claims are reasonably known to exist, prepare a plan with your client to preserve any social networking information that may be relevant.  It’s likely insufficient to assume that the social networking provider is maintaining an archive of posts and information—you or your client should preserve and maintain an archive of this information on a regular interval.

5.         When a claim does arise, notify the opposing party with the specifics of what social networking information you anticipate will be relevant in this case and instruct them to ensure this information is properly preserved.

6.         Remember – just because something is available electronically doesn’t mean that it can or should be produced instantly.  It may not even be subject to search.

7.         If your case is very complex, consider “unbundling” discovery tasks. Consider assembling a litigation management team to tackle electronic data discovery tasks.

8.         Maintain at least a general familiarity with developments in social networking in order to properly advise clients about how recent changes and developments may alter these recommendations.

9.         Plan in advance for proper authentication of electronic information obtained from social networking sites.  Consider whether it is appropriate to authenticate this information at an individual or 30(b)(6) deposition.

I will be posting more about the unique challenges posed by discovery of electronic information from social media networking sites, including ways to authenticate electronic data.  I’ll also address issues related to the preservation and spoliation of electronic evidence (including Tweets and text messages, to name just a few of the many sources of electronic evidence).



This post provides general legal information.  It is not legal advice tailored to your specific factual situation.